Articles with "security evaluation" as a keyword



Photo from wikipedia

Water security evaluation based on the TODIM method with probabilistic linguistic term sets

Sign Up to like & get
recommendations!
Published in 2019 at "Soft Computing"

DOI: 10.1007/s00500-018-3276-9

Abstract: Nowadays, water security is becoming increasingly prominent and the water security problem becomes a primary bottleneck restricting China’s future sustainable development. Water security in China is thus worth conducting an in-depth study. This paper aims… read more here.

Keywords: water security; security evaluation; water; probabilistic linguistic ... See more keywords
Photo from wikipedia

A Cyber Security Evaluation Framework for In-Vehicle Electrical Control Units

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3124565

Abstract: Modern vehicles are equipped with more than 100 Electrical Control Units (ECUs) with over 2500 signals to transmit internally. The application of advanced electronics and communication techniques helps a vehicle transform from an information island… read more here.

Keywords: vehicle; electrical control; security; security evaluation ... See more keywords
Photo by scottwebb from unsplash

Quantitative Security Evaluation of Intrusion Tolerant Systems With Markovian Arrivals

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Reliability"

DOI: 10.1109/tr.2020.3026570

Abstract: Intrusion tolerance is an ability to keep the correct service by masking the intrusion based on fault-tolerant techniques. With the rapid development of virtualization, the virtual machine (VM)-based intrusion tolerance scheme has been developed according… read more here.

Keywords: security evaluation; security; intrusion tolerant; intrusion ... See more keywords